Decay-Based DRAM PUFs in Commodity Devices
Schaller, Andre, Xiong, Wenjie, Anagnostopoulos, Nikolaos Athanasios, Saleem, Muhammad Umair, Gabmeyer, Sebastian, Skoric, Boris, Katzenbeisser, Stefan, Szefer, Jakub
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Get full text
Journal Article
The Spammed Code Offset Method
Skoric, Boris, de Vreede, Niels
Published in IEEE transactions on information forensics and security (01.05.2014)
Published in IEEE transactions on information forensics and security (01.05.2014)
Get full text
Journal Article
Optimized Quantization in Zero Leakage Helper Data Systems
Stanko, Taras, Nur Andini, Fitria, Skoric, Boris
Published in IEEE transactions on information forensics and security (01.08.2017)
Published in IEEE transactions on information forensics and security (01.08.2017)
Get full text
Journal Article
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
Oosterwijk, Jan-Jaap, Skoric, Boris, Doumen, Jeroen
Published in IEEE transactions on information theory (01.07.2015)
Published in IEEE transactions on information theory (01.07.2015)
Get full text
Journal Article
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Škorić, Boris, Katzenbeisser, Stefan, Celik, Mehmet U.
Published in Designs, codes, and cryptography (01.02.2008)
Published in Designs, codes, and cryptography (01.02.2008)
Get full text
Journal Article
Quantization in zero leakage helper data schemes
de Groot, Joep, Škorić, Boris, de Vreede, Niels, Linnartz, Jean-Paul
Published in EURASIP journal on advances in signal processing (05.05.2016)
Published in EURASIP journal on advances in signal processing (05.05.2016)
Get full text
Journal Article
Read-Proof Hardware from Protective Coatings
Tuyls, Pim, Schrijen, Geert-Jan, Škorić, Boris, van Geloven, Jan, Verhaegh, Nynke, Wolters, Rob
Published in Cryptographic Hardware and Embedded Systems - CHES 2006 (2006)
Published in Cryptographic Hardware and Embedded Systems - CHES 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
Dynamic Tardos Traitor Tracing Schemes
Laarhoven, T., Doumen, J., Roelse, P., Skoric, B., de Weger, B.
Published in IEEE transactions on information theory (01.07.2013)
Published in IEEE transactions on information theory (01.07.2013)
Get full text
Journal Article
Flow-based reputation with uncertainty: evidence-based subjective logic
Škorić, Boris, de Hoogh, Sebastiaan J. A., Zannone, Nicola
Published in International journal of information security (01.08.2016)
Published in International journal of information security (01.08.2016)
Get full text
Journal Article
Tardos Fingerprinting is Better Than We Thought
Skoric, B., Vladimirova, T.U., Celik, M., Talstra, J.C.
Published in IEEE transactions on information theory (01.08.2008)
Published in IEEE transactions on information theory (01.08.2008)
Get full text
Journal Article
Authenticated communication from quantum readout of PUFs
Škorić, Boris, Pinkse, Pepijn W. H., Mosk, Allard P.
Published in Quantum information processing (2017)
Published in Quantum information processing (2017)
Get full text
Journal Article
Asymmetric cryptography with physical unclonable keys
Uppu, Ravitej, Wolterink, Tom A W, Goorden, Sebastianus A, Chen, Bin, Škori, Boris, Mosk, Allard P, Pinkse, Pepijn W H
Published in Quantum science and technology (15.10.2019)
Published in Quantum science and technology (15.10.2019)
Get full text
Journal Article
Key Extraction From General Nondiscrete Signals
Verbitskiy, Evgeny A, Tuyls, Pim, Obi, Chibuzo, Schoenmakers, Berry, Skoric, Boris
Published in IEEE transactions on information forensics and security (01.06.2010)
Published in IEEE transactions on information forensics and security (01.06.2010)
Get full text
Journal Article